Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.196.218.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.196.218.22.			IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082901 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 30 07:56:03 CST 2020
;; MSG SIZE  rcvd: 118
Host info
22.218.196.134.in-addr.arpa domain name pointer cm-134-196-218-22.revip18.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.218.196.134.in-addr.arpa	name = cm-134-196-218-22.revip18.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.187.188.116 attackbotsspam
Aug 28 22:50:28 abendstille sshd\[32015\]: Invalid user b3 from 5.187.188.116
Aug 28 22:50:28 abendstille sshd\[32015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.188.116
Aug 28 22:50:30 abendstille sshd\[32015\]: Failed password for invalid user b3 from 5.187.188.116 port 42126 ssh2
Aug 28 22:54:14 abendstille sshd\[3472\]: Invalid user ansible from 5.187.188.116
Aug 28 22:54:14 abendstille sshd\[3472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.187.188.116
...
2020-08-29 05:25:18
5.196.8.72 attackbotsspam
Aug 28 17:21:47 firewall sshd[12186]: Invalid user helper from 5.196.8.72
Aug 28 17:21:49 firewall sshd[12186]: Failed password for invalid user helper from 5.196.8.72 port 37714 ssh2
Aug 28 17:24:34 firewall sshd[12256]: Invalid user bo from 5.196.8.72
...
2020-08-29 05:21:55
174.100.12.255 attack
Port Scan detected!
...
2020-08-29 04:49:25
144.64.3.101 attackbots
Time:     Fri Aug 28 20:43:54 2020 +0000
IP:       144.64.3.101 (bl23-3-101.dsl.telepac.pt)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 20:33:09 ca-18-ede1 sshd[15407]: Invalid user ansible from 144.64.3.101 port 45354
Aug 28 20:33:11 ca-18-ede1 sshd[15407]: Failed password for invalid user ansible from 144.64.3.101 port 45354 ssh2
Aug 28 20:40:11 ca-18-ede1 sshd[16172]: Invalid user alberto from 144.64.3.101 port 34626
Aug 28 20:40:13 ca-18-ede1 sshd[16172]: Failed password for invalid user alberto from 144.64.3.101 port 34626 ssh2
Aug 28 20:43:49 ca-18-ede1 sshd[16599]: Invalid user deploy from 144.64.3.101 port 43884
2020-08-29 04:55:12
122.51.209.74 attackbotsspam
2020-08-28T20:21:33.913960vps1033 sshd[3572]: Invalid user postgres from 122.51.209.74 port 41880
2020-08-28T20:21:33.918751vps1033 sshd[3572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.209.74
2020-08-28T20:21:33.913960vps1033 sshd[3572]: Invalid user postgres from 122.51.209.74 port 41880
2020-08-28T20:21:35.729300vps1033 sshd[3572]: Failed password for invalid user postgres from 122.51.209.74 port 41880 ssh2
2020-08-28T20:25:05.930701vps1033 sshd[11213]: Invalid user name from 122.51.209.74 port 51744
...
2020-08-29 04:49:56
104.41.24.109 attackbotsspam
2020-08-28 15:41:21.433540-0500  localhost sshd[74129]: Failed password for invalid user transfer from 104.41.24.109 port 45354 ssh2
2020-08-29 04:50:20
106.54.127.159 attackbots
2020-08-28T15:55:50.7360141495-001 sshd[29080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.159
2020-08-28T15:55:50.7319401495-001 sshd[29080]: Invalid user daryl from 106.54.127.159 port 38994
2020-08-28T15:55:52.7182561495-001 sshd[29080]: Failed password for invalid user daryl from 106.54.127.159 port 38994 ssh2
2020-08-28T15:59:16.9491211495-001 sshd[29245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.159  user=root
2020-08-28T15:59:18.8763771495-001 sshd[29245]: Failed password for root from 106.54.127.159 port 48640 ssh2
2020-08-28T16:02:41.6465201495-001 sshd[29398]: Invalid user RPM from 106.54.127.159 port 58284
...
2020-08-29 05:26:48
161.35.172.8 attack
2020-08-28T20:30:04.681Z CLOSE host=161.35.172.8 port=57274 fd=4 time=20.009 bytes=10
...
2020-08-29 05:10:06
104.131.131.140 attack
Aug 28 23:44:19 pkdns2 sshd\[56504\]: Invalid user oracle from 104.131.131.140Aug 28 23:44:21 pkdns2 sshd\[56504\]: Failed password for invalid user oracle from 104.131.131.140 port 49585 ssh2Aug 28 23:47:32 pkdns2 sshd\[56697\]: Invalid user openerp from 104.131.131.140Aug 28 23:47:35 pkdns2 sshd\[56697\]: Failed password for invalid user openerp from 104.131.131.140 port 45128 ssh2Aug 28 23:50:58 pkdns2 sshd\[56889\]: Invalid user zzh from 104.131.131.140Aug 28 23:51:00 pkdns2 sshd\[56889\]: Failed password for invalid user zzh from 104.131.131.140 port 40672 ssh2
...
2020-08-29 05:16:32
200.27.18.138 attackspam
Dovecot Invalid User Login Attempt.
2020-08-29 05:10:43
103.78.75.69 attackbots
Dovecot Invalid User Login Attempt.
2020-08-29 04:46:07
157.230.132.100 attack
2020-08-28 15:22:21.590027-0500  localhost sshd[72729]: Failed password for invalid user nfsnobody from 157.230.132.100 port 54634 ssh2
2020-08-29 04:54:03
216.244.66.200 attack
(mod_security) mod_security (id:210730) triggered by 216.244.66.200 (US/United States/-): 5 in the last 3600 secs
2020-08-29 05:17:32
203.86.7.110 attack
Invalid user webster from 203.86.7.110 port 34926
2020-08-29 05:08:44
60.199.131.62 attackspam
2020-08-28 15:23:46.535593-0500  localhost sshd[72833]: Failed password for invalid user jenkins from 60.199.131.62 port 40516 ssh2
2020-08-29 04:53:07

Recently Reported IPs

1.62.151.138 83.55.136.17 1.62.151.101 211.100.32.77
86.249.14.224 183.89.177.90 190.196.226.215 122.166.104.18
109.177.192.101 166.205.24.241 27.187.205.133 105.112.70.98
109.227.100.85 136.183.160.88 212.70.0.16 191.172.162.162
85.8.61.128 119.146.200.20 98.109.240.132 109.255.112.165